linux-hyperv.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2022-08-16 17:23:36 to 2022-09-05 08:59:46 UTC [more...]

[PATCH v1 1/1] Create debugfs file with hyper-v balloon usage information
 2022-09-05  8:59 UTC  (6+ messages)
` [PATCH v3 "

[PATCH] Drivers: hv: Fix double word in comments
 2022-09-04 15:48 UTC 

[PATCH v2 0/2] Drivers: hv: balloon: Temporary fixes for ARM64
 2022-09-01  9:52 UTC  (4+ messages)
` [PATCH v2 1/2] Drivers: hv: balloon: Support status report for larger page sizes

[PATCH v2 1/3] net: move from strlcpy with unused retval to strscpy
 2022-08-31 22:00 UTC  (2+ messages)

[PATCH v2 0/3] KVM: x86: Hyper-V invariant TSC control feature
 2022-08-31 10:44 UTC  (6+ messages)
` [PATCH v2 1/3] KVM: x86: Hyper-V invariant TSC control
` [PATCH v2 2/3] KVM: selftests: Rename 'msr->availble' to 'msr->should_not_gp' in hyperv_features test
` [PATCH v2 3/3] KVM: selftests: Test Hyper-V invariant TSC control

[Patch v5 00/12] Introduce Microsoft Azure Network Adapter (MANA) RDMA driver
 2022-08-31  0:34 UTC  (13+ messages)
` [Patch v5 01/12] net: mana: Add support for auxiliary device
` [Patch v5 02/12] net: mana: Record the physical address for doorbell page region
` [Patch v5 03/12] net: mana: Handle vport sharing between devices
` [Patch v5 04/12] net: mana: Add functions for allocating doorbell page from GDMA
` [Patch v5 05/12] net: mana: Set the DMA device max segment size
` [Patch v5 06/12] net: mana: Export Work Queue functions for use by RDMA driver
` [Patch v5 07/12] net: mana: Record port number in netdev
` [Patch v5 08/12] net: mana: Move header files to a common location
` [Patch v5 09/12] net: mana: Define max values for SGL entries
` [Patch v5 10/12] net: mana: Define and process GDMA response code GDMA_STATUS_MORE_ENTRIES
` [Patch v5 11/12] net: mana: Define data structures for protection domain and memory registration
` [Patch v5 12/12] RDMA/mana_ib: Add a driver for Microsoft Azure Network Adapter

[PATCH v1 5/5][RFT] ACPI: Drop parent field from struct acpi_device
 2022-08-30 21:29 UTC  (7+ messages)
  ` [PATCH v2 5/5] "

[PATCH v9 00/40] KVM: x86: hyper-v: Fine-grained TLB flush + L2 TLB flush features
 2022-08-30 16:27 UTC  (3+ messages)

[PATCH v6 00/33] KVM: VMX: Support updated eVMCSv1 revision + use vmcs_config for L1 VMX MSRs
 2022-08-30 13:37 UTC  (34+ messages)
` [PATCH v6 01/33] x86/hyperv: Fix 'struct hv_enlightened_vmcs' definition
` [PATCH v6 02/33] x86/hyperv: Update "
` [PATCH v6 03/33] KVM: x86: Zero out entire Hyper-V CPUID cache before processing entries
` [PATCH v6 04/33] KVM: x86: Check for existing Hyper-V vCPU in kvm_hv_vcpu_init()
` [PATCH v6 05/33] KVM: x86: Report error when setting CPUID if Hyper-V allocation fails
` [PATCH v6 06/33] KVM: nVMX: Treat eVMCS as enabled for guest iff Hyper-V is also enabled
` [PATCH v6 07/33] KVM: nVMX: Refactor unsupported eVMCS controls logic to use 2-d array
` [PATCH v6 08/33] KVM: nVMX: Use CC() macro to handle eVMCS unsupported controls checks
` [PATCH v6 09/33] KVM: VMX: Define VMCS-to-EVMCS conversion for the new fields
` [PATCH v6 10/33] KVM: nVMX: Support several new fields in eVMCSv1
` [PATCH v6 11/33] KVM: x86: hyper-v: Cache HYPERV_CPUID_NESTED_FEATURES CPUID leaf
` [PATCH v6 12/33] KVM: selftests: Add ENCLS_EXITING_BITMAP{,HIGH} VMCS fields
` [PATCH v6 13/33] KVM: selftests: Switch to updated eVMCSv1 definition
` [PATCH v6 14/33] KVM: nVMX: WARN once and fail VM-Enter if eVMCS sees VMFUNC[63:32] != 0
` [PATCH v6 15/33] KVM: nVMX: Support PERF_GLOBAL_CTRL with enlightened VMCS
` [PATCH v6 16/33] KVM: VMX: Get rid of eVMCS specific VMX controls sanitization
` [PATCH v6 17/33] KVM: nVMX: Don't propagate vmcs12's PERF_GLOBAL_CTRL settings to vmcs02
` [PATCH v6 18/33] KVM: nVMX: Always emulate PERF_GLOBAL_CTRL VM-Entry/VM-Exit controls
` [PATCH v6 19/33] KVM: VMX: Check VM_ENTRY_IA32E_MODE in setup_vmcs_config()
` [PATCH v6 20/33] KVM: VMX: Check CPU_BASED_{INTR,NMI}_WINDOW_EXITING "
` [PATCH v6 21/33] KVM: VMX: Tweak the special handling of SECONDARY_EXEC_ENCLS_EXITING "
` [PATCH v6 22/33] KVM: VMX: Don't toggle VM_ENTRY_IA32E_MODE for 32-bit kernels/KVM
` [PATCH v6 23/33] KVM: VMX: Extend VMX controls macro shenanigans
` [PATCH v6 24/33] KVM: VMX: Move CPU_BASED_CR8_{LOAD,STORE}_EXITING filtering out of setup_vmcs_config()
` [PATCH v6 25/33] KVM: VMX: Add missing VMEXIT controls to vmcs_config
` [PATCH v6 26/33] KVM: VMX: Add missing CPU based VM execution "
` [PATCH v6 27/33] KVM: VMX: Adjust CR3/INVPLG interception for EPT=y at runtime, not setup
` [PATCH v6 28/33] KVM: x86: VMX: Replace some Intel model numbers with mnemonics
` [PATCH v6 29/33] KVM: VMX: Move LOAD_IA32_PERF_GLOBAL_CTRL errata handling out of setup_vmcs_config()
` [PATCH v6 30/33] KVM: nVMX: Always set required-1 bits of pinbased_ctls to PIN_BASED_ALWAYSON_WITHOUT_TRUE_MSR
` [PATCH v6 31/33] KVM: nVMX: Use sanitized allowed-1 bits for VMX control MSRs
` [PATCH v6 32/33] KVM: VMX: Cache MSR_IA32_VMX_MISC in vmcs_config
` [PATCH v6 33/33] KVM: nVMX: Use cached host MSR_IA32_VMX_MISC value for setting up nested MSR

[PATCH v3 0/3] Drivers: hv: Avoid allocating MMIO from framebuffer region for other passed through PCI devices
 2022-08-30  7:31 UTC  (6+ messages)
` [PATCH v3 1/3] PCI: Move PCI_VENDOR_ID_MICROSOFT/PCI_DEVICE_ID_HYPERV_VIDEO definitions to pci_ids.h
` [PATCH v3 2/3] Drivers: hv: Always reserve framebuffer region for Gen1 VMs
` [PATCH v3 3/3] Drivers: hv: Never allocate anything besides framebuffer from framebuffer memory region

[PATCH net-next v4 0/9] vsock: updates for SO_RCVLOWAT handling
 2022-08-29 13:52 UTC  (17+ messages)
` [PATCH net-next v4 1/9] vsock: SO_RCVLOWAT transport set callback
` [PATCH net-next v4 2/9] hv_sock: disable SO_RCVLOWAT support
` [PATCH net-next v4 3/9] virtio/vsock: use 'target' in notify_poll_in callback
` [PATCH net-next v4 4/9] vmci/vsock: "
` [PATCH net-next v4 5/9] vsock: pass sock_rcvlowat to notify_poll_in as target
` [PATCH net-next v4 6/9] vsock: add API call for data ready
` [PATCH net-next v4 7/9] virtio/vsock: check SO_RCVLOWAT before wake up reader
` [PATCH net-next v4 8/9] vmci/vsock: "
` [PATCH net-next v4 9/9] vsock_test: POLLIN + SO_RCVLOWAT test

[PATCH v2 0/3] Drivers: hv: Avoid allocating MMIO from framebuffer region for other passed through PCI devices
 2022-08-27 12:46 UTC  (10+ messages)
` [PATCH v2 1/3] PCI: Move PCI_VENDOR_ID_MICROSOFT/PCI_DEVICE_ID_HYPERV_VIDEO definitions to pci_ids.h
` [PATCH v2 2/3] Drivers: hv: Always reserve framebuffer region for Gen1 VMs
` [PATCH v2 3/3] Drivers: hv: Never allocate anything besides framebuffer from framebuffer memory region

[PATCH] hv/hv_kvp_daemon: remove unnecessary (void*) conversions
 2022-08-25 17:14 UTC  (2+ messages)

[PATCH v5 00/26] KVM: VMX: Support updated eVMCSv1 revision + use vmcs_config for L1 VMX MSRs
 2022-08-23 20:16 UTC  (37+ messages)
` [PATCH v5 01/26] KVM: x86: hyper-v: Expose access to debug MSRs in the partition privilege flags
` [PATCH v5 03/26] x86/hyperv: Update 'struct hv_enlightened_vmcs' definition
` [PATCH v5 09/26] KVM: VMX: nVMX: Support TSC scaling and PERF_GLOBAL_CTRL with enlightened VMCS
` [PATCH v5 22/26] KVM: VMX: Move LOAD_IA32_PERF_GLOBAL_CTRL errata handling out of setup_vmcs_config()

[PATCH v1 0/4] Drivers: hv: Avoid allocating MMIO from framebuffer region for other passed through PCI devices
 2022-08-23 14:03 UTC  (10+ messages)
` [PATCH v1 1/4] Drivers: hv: Move legacy Hyper-V PCI video device's ids to linux/hyperv.h
` [PATCH v1 2/4] drm/hyperv: Don't forget to put PCI device when removing conflicting FB fails
` [PATCH v1 3/4] Drivers: hv: Always reserve framebuffer region for Gen1 VMs
` [PATCH v1 4/4] Drivers: hv: Never allocate anything besides framebuffer from framebuffer memory region

[PATCH] Input: move from strlcpy with unused retval to strscpy
 2022-08-23  4:27 UTC  (2+ messages)

[PATCH v1 4/4] swiotlb: panic if nslabs is too small
 2022-08-22 23:47 UTC  (7+ messages)

[PATCH v3 0/4] Make balloon drivers memory changes known to the rest of the kernel
 2022-08-22 11:37 UTC 

[PATCH V3 00/11] The panic notifiers refactor - fixes/clean-ups (V3)
 2022-08-19 22:17 UTC  (12+ messages)
` [PATCH V3 01/11] ARM: Disable FIQs (but not IRQs) on CPUs shutdown paths
` [PATCH V3 02/11] notifier: Add panic notifiers info and purge trailing whitespaces
` [PATCH V3 03/11] alpha: Clean-up the panic notifier code
` [PATCH V3 04/11] um: Improve panic notifiers consistency and ordering
` [PATCH V3 05/11] parisc: Replace regular spinlock with spin_trylock on panic path
` [PATCH V3 06/11] tracing: Improve panic/die notifiers
` [PATCH V3 07/11] notifiers: Add tracepoints to the notifiers infrastructure
` [PATCH V3 08/11] EDAC/altera: Skip the panic notifier if kdump is loaded
` [PATCH V3 09/11] video/hyperv_fb: Avoid taking busy spinlock on panic path
` [PATCH V3 10/11] drivers/hv/vmbus, video/hyperv_fb: Untangle and refactor Hyper-V panic notifiers
` [PATCH V3 11/11] panic: Fixes the panic_print NMI backtrace setting

[PATCH] PCI: hv: Fix the definiton of vector in hv_compose_msi_msg()
 2022-08-19 15:57 UTC  (6+ messages)

[RFC PATCH v3 0/9] vsock: updates for SO_RCVLOWAT handling
 2022-08-19  4:49 UTC  (7+ messages)
` [RFC PATCH v3 4/9] vmci/vsock: use 'target' in notify_poll_in callback
` [RFC PATCH v3 8/9] vmci/vsock: check SO_RCVLOWAT before wake up reader

[PATCH 0/6] virtio/vsock: introduce dgrams, sk_buff, and qdisc
 2022-08-18  4:28 UTC  (11+ messages)
` [PATCH 2/6] vsock: return errors other than -ENOMEM to socket
    ` [virtio-dev] "

[PATCH v2 00/13] The panic notifiers refactor strikes back - fixes/clean-ups
 2022-08-17 22:49 UTC  (21+ messages)
` [PATCH v2 08/13] tracing: Improve panic/die notifiers
` [PATCH v2 10/13] EDAC/altera: Skip the panic notifier if kdump is loaded

[PATCH] tools: hv: Fix comment typo
 2022-08-17 11:02 UTC  (2+ messages)

[PATCH] PCI: hv: Only reuse existing IRTE allocation for Multi-MSI
 2022-08-17  7:51 UTC  (8+ messages)


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).